Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-23747 | NET0812 | SV-28651r2_rule | ECSC-1 | Low |
Description |
---|
Without synchronized time, accurately correlating information between devices becomes difficult, if not impossible. If logs cannot be successfully compared between each of the routers, switches, and firewalls, it will be very difficult to determine the exact events that resulted in a network breach incident. NTP provides an efficient and scalable method for network elements to synchronize to an accurate time source. |
STIG | Date |
---|---|
WMAN Access Point Security Technical Implementation Guide (STIG) | 2014-04-07 |
Check Text ( C-3581r3_chk ) |
---|
Review the configuration and verify two NTP servers have been defined. |
Fix Text (F-3044r1_fix) |
---|
Specify two NTP server IP addresses on the device to be used to request time from. |